SEARCH RESULTS

YOU WERE LOOKING FOR :Why Passwords and Good Information Security Technologies Are Compromised by Users

Essays 61 - 90

Information Technology Knowledge Needed by a Risk or Security Manager

nuts and bolts of I.T., or is a cursory knowledge sufficient? In part, the answer lies in management ideology. Do managers need to...

Airline Company's Information Technology System Security Issues

time will obviously be severely undermined if security issues mean that customers do not have confidence that their transactions w...

Employee Training and Information Systems

In nine pages this paper discusses the importance of training employees in information system technology in an assessment of such ...

Four Poems by A.R. Ammons

In this essay containing five pages the symbolism and imagery similarities in Ammons' poems The Damned, Anxiety's Prosody, Kind, a...

Health Information Technology

This essay discusses the health information technology economic and clinical health act, which addresses using technology in healt...

Customer Trust and Security of Information

to maintain trust between the people engaging in transaction" such that customers remain entirely satisfied with the level of trus...

Self, Legitimacy, and Democracy in Habermas and Connolly

I. HABERMAS The social, political, economical and religious activities experienced in everyday life represent the very esse...

Computer Hacking and Information Warfare

In twenty pages this paper discusses PC users and small business in a consideration of Internet security breaches through computer...

Computer Espionage and Emergencies of National Security

In five pages this paper examines the computer espionage threats to national security and technology being developed to eliminate ...

College Campuses and Date Rape

In ten pages college campuses and the incidences of acquaintance or date rape are examined in terms of information, statistics, se...

Network Security and Computers

than fifteen percent back in 1994. It can be argued that with the ever-expanding user-friendly applications over the past decade ...

Security Patches Released by Microsoft

released in 2001 to correct the programs "vulnerability that could allow malicious code to run in a Rich Text Format (RTF) documen...

Security Patches and Microsoft II

overcoming security holes that have been uncovered before a Microsoft security patch has been released" (Saran, 2005, p. 4). The a...

U.S. Homeland Security and Technology That is Becoming Obsolete

of the World Trade Center and the subsequent attack on the Pentagon itself, numerous government officials have come to more fully ...

IS and Risk Assessment

hackers can readily infiltrate any given companys entire computer system with the intent to destroy data is more than enough reaso...

Safeguards and Penalties for Improper Use of Data and U.S. Law

to criminal issues were not sufficient to address computer fraud. To an extent, wire and mail fraud issues were addressed in the p...

Negative Outcomes Resulting from the Impact of IT on Globalization

demonstrating the current influences and the wonders of the modern world that have already taken place. We can argue it is only by...

Wal-Mart Porter Analysis & Value Chain

two-thirds of which are in the U.S. (Biesada 2006). Besides its own stores, Wal-Mart holds a majority position in Seiyu, Co., Ltd,...

Does Technology Improve Learning

classroom with state-of-the art technology, it must be worth the expense. Part 2. Examples of studies investigating this questio...

Nature Versus Industrialization

their lives and they were willing to offer such gifts to others, symbolic of their natural existence and nature as giving people....

Military Operations and IT

easily by insiders (Shaw, Ruby and Post, 1998). In the second case described above, the enlisted man was a convicted hacker to who...

The Importance Of Metrics For Monitoring Organizational Performance

against previous performance, idea goals or best practice figures. Metric may be used in a variety of context, form use in single ...

Lease or Buy?

This 3 page paper looks at two issues. The first assesses whether it is best to lease or buy equipment, the second considers issue...

Global Data Security

type of electronic data and information is highly vulnerable to breaches. The Global Security Market and Trends This is a growi...

Biometric Technology & Identity Theft

Also, identity thieves have found that the resources of law enforcement are totally inadequate in regards to this type of lawbreak...

Homeland Security, INS and Epidemiology

problems, but refugees are perhaps most at risk, since many of them "come from areas where disease control, diagnosis and treatmen...

Ethics Concerning Homeland Security and Law Enforcement

homeland security and especially the Patriot Act, it may well be that the law enforcement agencies of the nation are infringing on...

Is An Improved Conceptual Framework Is Likely To Enhance The Capacity Of Users To Make Sound Financial Allocation Decisions?

scenarios to those mentioned above are to be avoided and increased clarity is to be achieved. However, it may be argued that many ...

Civil Liberties, Terrorism, and Immigration Laws

the arrests and the consequent interrogations that they were outraged and told officials that these tactics would not prove to be ...

Issues Involving Computer Viruses

In a paper consisting of twenty one pages compromised computer security and Internet privacy are just two of the issues considered...